咨询与建议

限定检索结果

文献类型

  • 169 篇 期刊文献
  • 77 篇 会议

馆藏范围

  • 246 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 200 篇 工学
    • 149 篇 计算机科学与技术...
    • 98 篇 软件工程
    • 51 篇 信息与通信工程
    • 17 篇 电子科学与技术(可...
    • 14 篇 机械工程
    • 13 篇 生物工程
    • 12 篇 动力工程及工程热...
    • 12 篇 控制科学与工程
    • 8 篇 化学工程与技术
    • 6 篇 电气工程
    • 6 篇 生物医学工程(可授...
    • 5 篇 光学工程
    • 5 篇 仪器科学与技术
    • 5 篇 网络空间安全
    • 4 篇 航空宇航科学与技...
  • 92 篇 理学
    • 43 篇 数学
    • 33 篇 物理学
    • 14 篇 生物学
    • 8 篇 化学
    • 8 篇 统计学(可授理学、...
    • 6 篇 大气科学
    • 5 篇 系统科学
  • 47 篇 管理学
    • 26 篇 管理科学与工程(可...
    • 25 篇 图书情报与档案管...
    • 13 篇 工商管理
  • 9 篇 法学
    • 6 篇 法学
    • 3 篇 社会学
  • 8 篇 医学
    • 6 篇 临床医学
  • 4 篇 经济学
    • 4 篇 应用经济学
  • 3 篇 文学
    • 3 篇 外国语言文学
  • 2 篇 农学
  • 2 篇 军事学
  • 1 篇 艺术学

主题

  • 9 篇 steganography
  • 7 篇 cloud computing
  • 7 篇 cloud storage
  • 6 篇 wireless sensor ...
  • 5 篇 semantics
  • 5 篇 feature extracti...
  • 4 篇 deep learning
  • 4 篇 cnn
  • 4 篇 convolutional ne...
  • 4 篇 virtual surgery
  • 3 篇 object detection
  • 3 篇 access control
  • 3 篇 reinforcement le...
  • 3 篇 outsourcing
  • 3 篇 target tracking
  • 3 篇 efficiency
  • 3 篇 face recognition
  • 3 篇 convolution
  • 3 篇 data mining
  • 3 篇 roi

机构

  • 86 篇 school of comput...
  • 77 篇 jiangsu engineer...
  • 22 篇 jiangsu engineer...
  • 19 篇 jiangsu collabor...
  • 14 篇 school of comput...
  • 13 篇 school of comput...
  • 12 篇 wuxi research in...
  • 12 篇 jiangsu engineer...
  • 11 篇 engineering rese...
  • 11 篇 state key labora...
  • 9 篇 school of automa...
  • 8 篇 jiangsu engineer...
  • 8 篇 jiangsu engineer...
  • 7 篇 school of comput...
  • 6 篇 school of comput...
  • 6 篇 college of compu...
  • 5 篇 jiangsu engineer...
  • 5 篇 jiangsu engineer...
  • 5 篇 school of comput...
  • 5 篇 school of comput...

作者

  • 35 篇 wang jin
  • 26 篇 sun xingming
  • 18 篇 xiaorui zhang
  • 18 篇 xingming sun
  • 17 篇 wei sun
  • 16 篇 shen jian
  • 12 篇 xu xiaolong
  • 10 篇 zhangjie fu
  • 10 篇 xia zhihua
  • 10 篇 sunil kumar jha
  • 9 篇 wang baowei
  • 9 篇 wenjie liu
  • 9 篇 ma li
  • 8 篇 liu wenjie
  • 7 篇 jin wang
  • 7 篇 ma tinghuai
  • 7 篇 liu wen-jie
  • 6 篇 ruohan meng
  • 6 篇 qi cui
  • 6 篇 liu qi

语言

  • 242 篇 英文
  • 3 篇 中文
  • 1 篇 其他
检索条件"机构=Jiangsu Engineering Center of Network Monitoring School of Computer and Software"
246 条 记 录,以下是41-50 订阅
排序:
A WiFi-aware method for mobile data offloading with deadline constraints
A WiFi-aware method for mobile data offloading with deadline...
收藏 引用
作者: Tang, Wenda Wu, Chaobing Qi, Lianyong Zhang, Xuyun Xu, Xiaolong Dou, Wanchun State Key Laboratory for Novel Software Technology Nanjing University Nanjing China Department of Computer Science and Technology Nanjing University Nanjing China School of Information Science and Engineering Chinese Academy of Education Big Data Qufu Normal University Rizhao China Department of Electrical and Computer Engineering The University of Auckland Auckland New Zealand Jiangsu Engineering Centre of Network Monitoring School of Computer and Software Nanjing University of Information Science and Technology Nanjing China
With an increasing number of public WiFi hotspots have been constructed in metropolitan areas, citizens can leverage these WiFi hotspots to surf the Internet with their smart devices almost everywhere. Compared to cel... 详细信息
来源: 评论
Access Control Policy Based on Friend Circle
收藏 引用
computers, Materials & Continua 2020年 第3期62卷 1143-1159页
作者: Qin Liu Tinghuai Ma Fan Xing Yuan Tian Abdullah Al-Dhelaan Mohammed Al-Dhelaan School of Computer and Software Nanjing University of Information Science and TechnologyNanjing210044China CICAEET Jiangsu Engineering Centre of Network MonitoringNanjing University of Information Science and TechnologyNanjing210044China Computer Science Department College of Computer and Information SciencesKing Saud UniversityRiyadh11362Saudi Arabia
Nowadays,the scale of the user’s personal social network(personal network,a network of the user and their friends,where the user we call“center user”)is becoming larger and more *** is difficult to find a suitable ... 详细信息
来源: 评论
A Robust Watermarking Scheme Based on ROI and IWT for Remote Consultation of COVID-19
收藏 引用
computers, Materials & Continua 2020年 第9期64卷 1435-1452页
作者: Xiaorui Zhang Wenfang Zhang Wei Sun Tong Xu Sunil Kumar Jha Jiangsu Engineering Center of Network Monitoring Engineering Research Center of Digital ForensicsMinistry of EducationSchool of Computer and SoftwareNanjing University of Information Science&TechnologyNanjing210044China Jiangsu Collaborative Innovation Center of Atmospheric Environment and Equipment Technology Nanjing University of Information Science&TechnologyNanjing210044China IT Fundamentals and Education Technologies Applications University of Information Technology and Management in RzeszowRzeszow100031Poland
In the current dire situation of the corona virus COVID-19,remote consultations were proposed to avoid cross-infection and regional differences in medical ***,the safety of digital medical imaging in remote consultati... 详细信息
来源: 评论
Cubic convolutional neural network for hyperspectral image classification  6th
Cubic convolutional neural network for hyperspectral image c...
收藏 引用
6th International Conference on Artificial Intelligence and Security,ICAIS 2020
作者: Sun, Le Song, Xiangbo Jiangsu Engineering Center of Network Monitoring Nanjing University of Information Science and Technology Nanjing210044 China School of Computer and Software Nanjing University of Information Science and Technology Nanjing210044 China
In recent years, the framework of convolutional neural network based on deep learning (DL) has made good progress in the field of hyperspectral image (HSI) classification. In order to improve the classification accura... 详细信息
来源: 评论
A High-Fidelity Virtual Liver Model Incorporating Biological Characteristics
SSRN
收藏 引用
SSRN 2023年
作者: Zhang, Xiaorui Zhang, Wenzheng Sun, Wei Song, Aiguo Xu, Tong Engineering Research Center of Digital Forensics Ministry of Education Jiangsu Engineering Center of Network Monitoring School of Computer and Software Nanjing University of Information Science & Technology Nanjing210044 China Wuxi Research Institute Nanjing University of Information Science & Technology Wuxi214100 China School of Automation Nanjing University of Information Science & Technology Nanjing210044 China State Key Laboratory of Bioelectronics Jiangsu Key Lab of Remote Measurement and Control School of Instrument Science and Engineering Southeast University Nanjing210096 China University of Southern California Los AngelesCA United States
Flexible tissue modeling plays an important role in the field of telemedicine. It is related to whether the soft tissue deformation process can be accurately, real-time and vividly simulated during surgery. However, m... 详细信息
来源: 评论
Impact Force Magnitude and Location Recognition of Composite Materials
收藏 引用
computers, Materials & Continua 2020年 第9期64卷 1647-1656页
作者: Yajie Sun Yanqing Yuan Qi Wang Sai Ji Lihua Wang Shao’en Wu Jiangsu Engineering Centre of Network Monitoring Nanjing University of Information Science and TechnologyNanjing210044China School of Computer and Software Nanjing University of Information Science and TechnologyNanjing210044China School of Information and Control Nanjing University of Information Science and TechnologyNanjing210044China Department of Computer Science Ball State UniversityMuncieUSA
In order to identify the location and magnitude of the impact force accurately,determine the damage range of the structure and accelerate the health monitoring of key components of the composite,this paper studies the... 详细信息
来源: 评论
Quantum Searchable Encryption for Cloud Data Based on Delegating Quantum Computing  9th
Quantum Searchable Encryption for Cloud Data Based on Delega...
收藏 引用
9th EAI International Conference on Cloud Computing, CloudComp 2019 and the 4th EAI International Conference on Smart Grid and Innovative Frontiers in Telecommunications, SmartGIFT 2019
作者: Xu, Yinsong Liu, Wenjie Chen, Junxiu Tong, Lian School of Computer and Software Nanjing University of Information Science and Technology Nanjing210044 China Jiangsu Engineering Center of Network Monitoring Nanjing University of Information Science and Technology Nanjing210044 China School of Information Engineering Jiangsu Maritime Institute Nanjing211100 China
Based on delegating quantum computing (DQC), a DQC model that adapts to multi-qubit and composite quantum circuits is given firstly. In this model, the single client with limited quantum ability can give her encrypted... 详细信息
来源: 评论
An Improvement of Coherent Semantic Attention for Image Inpainting  1
收藏 引用
6th International Conference on Artificial Intelligence and Security,ICAIS 2020
作者: Wang, Weiqing Gu, Enming Fang, Wei School of Computer & Software Jiangsu Engineering Center of Network Monitoring Nanjing University of Information Science and Technology Nanjing China State Key Laboratory for Novel Software Technology Nanjing University Nanjing China Jiangsu Key Laboratory of Computer Information Process Technology SooChow University Suzhou China
In some image restoration algorithms of the past, they often do not consider the continuity between pixels, and the internal features of the hole region. The mapping to the image semantically does not take into accoun... 详细信息
来源: 评论
Semi-supervised stacked autoencoder-based deep hierarchical semantic feature for real-time fingerprint liveness detection
Semi-supervised stacked autoencoder-based deep hierarchical ...
收藏 引用
作者: Yuan, Chengsheng Chen, Xianyi Yu, Peipeng Meng, Ruohan Cheng, Weijin Wu, Q. M. Jonathan Sun, Xingming School of Computer and Software Nanjing University of Information Science and Technology Nanjing210044 China Jiangsu Engineering Center of Network Monitoring Nanjing210044 China Department of Electrical and Computer Engineering University of Windsor WindsorONN9B 3P4 Canada
The popularity of biometric authentication technology benefits from the rapid development of smart mobile devices in recent years, and fingerprints, which are inherent human traits and neither easily revealed nor deci... 详细信息
来源: 评论
Fusion of Internal Similarity to Improve the Accuracy of Recommendation Algorithm
收藏 引用
Journal on Internet of Things 2021年 第2期3卷 65-76页
作者: Zejun Yang Denghui Xia Jin Liu Chao Zheng Yanzhen Qu Yadang Chen Chengjun Zhang School of Computer and Software Nanjing University of Information Science and TechnologyNanjing210044China Yukun(Beijing)Network Technology Co. Ltd.Beijing102200China Jiangsu Engineering Center of Network Monitoring Nanjing University of Information Science and TechnologyNanjing210044China School of Computer Science and Technology Colorado Technical UniversityColorado Springs80907USA
Collaborative filtering algorithms(CF)and mass diffusion(MD)algorithms have been successfully applied to recommender systems for years and can solve the problem of information ***,both algorithms suffer from data spar... 详细信息
来源: 评论